CVE-2025-52654

4.6 MEDIUM

📋 TL;DR

HCL MyXalytics v6.6 has an HTML injection vulnerability where untrusted input isn't properly sanitized before being included in web output. This allows attackers to inject arbitrary HTML content into pages viewed by other users. Organizations using HCL MyXalytics v6.6 are affected.

💻 Affected Systems

Products:
  • HCL MyXalytics
Versions: v6.6
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Any deployment of HCL MyXalytics v6.6 is vulnerable unless patched or workarounds applied.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts, redirect users to phishing sites, deface the application interface, or perform session hijacking through persistent HTML injection.

🟠

Likely Case

Limited content manipulation, defacement of specific pages, or injection of benign HTML elements that disrupt user experience.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability is prevented entirely with no impact.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

HTML injection typically requires some level of user interaction or access to input fields. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0124411

Restart Required: Yes

Instructions:

1. Review vendor advisory KB0124411. 2. Download and apply the official patch from HCL. 3. Restart the MyXalytics service. 4. Verify the fix by testing input fields.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize HTML tags and special characters

Implementation depends on application framework - review HCL documentation for input filtering options

Web Application Firewall Rules

all

Configure WAF to block HTML injection patterns

Add WAF rules to detect and block <script>, <iframe>, javascript:, and other HTML injection patterns

🧯 If You Can't Patch

  • Implement strict input validation on all user-controllable fields
  • Deploy a web application firewall with HTML injection protection rules

🔍 How to Verify

Check if Vulnerable:

Test input fields by submitting HTML tags like <b>test</b> or <script>alert(1)</script> and check if they render in output

Check Version:

Check MyXalytics administration console or configuration files for version information

Verify Fix Applied:

After patching, repeat the vulnerability test - HTML tags should be displayed as plain text, not rendered

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML tags in user input logs
  • Multiple failed injection attempts
  • Suspicious content in form submissions

Network Indicators:

  • HTTP requests containing HTML injection patterns
  • Unusual content-type headers

SIEM Query:

source="myxalytics_logs" AND (message="*<script>*" OR message="*javascript:*" OR message="*<iframe>*")

🔗 References

📤 Share & Export